DSA-2021-093: Dell Data Protection Central Security Update for Multiple Third-Party Component Vulnerabilities
Resumen: Dell Data Protection Central remediation is available for multiple security vulnerabilities that may be exploited by malicious users to compromise the affected system.
Este artículo se aplica a
Este artículo no se aplica a
Este artículo no está vinculado a ningún producto específico.
No se identifican todas las versiones del producto en este artículo.
Impacto
Critical
Detalles
SP2-based systems
| Third-party Component | CVEs | More Information |
| bind-libs=9.9.9P1-63.20.1 bind-utils=9.9.9P1-63.20.1 |
CVE-2020-8625 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE. |
| glib2-lang=2.48.2-12.22.1 libglib-2_0-0=2.48.2-12.22.1 libgmodule-2_0-0=2.48.2-12.22.1 libgobject-2_0-0=2.48.2-12.22.1 |
CVE-2021-27218 | |
| CVE-2021-27219 | ||
| grub2=2.02-115.59.1 grub2-i386-pc=2.02-115.59.1 grub2-snapper-plugin=2.02-115.59.1 grub2-systemd-sleep-plugin=2.02-115.59.1 |
CVE-2021-20225 | |
| CVE-2020-14372 | ||
| CVE-2020-27749 | ||
| CVE-2021-20233 | ||
| CVE-2020-25647 | ||
| CVE-2020-25632 | ||
| CVE-2020-27779 | ||
| kernel-default=4.4.121-92.152.2 | CVE-2021-26930 | |
| CVE-2021-26931 | ||
| CVE-2021-26932 | ||
| CVE-2020-27786 | ||
| CVE-2021-3347 | ||
| CVE-2020-25211 | ||
| CVE-2020-27673 | ||
| CVE-2020-27675 | ||
| CVE-2020-29568 | ||
| CVE-2020-29569 | ||
| CVE-2020-0466 | ||
| CVE-2020-0444 | ||
| CVE-2020-28374 | ||
| CVE-2020-36158 | ||
| CVE-2020-27825 | ||
| CVE-2020-27068 | ||
| CVE-2020-0465 | ||
| CVE-2020-29660 | ||
| CVE-2020-29661 | ||
| CVE-2020-27777 | ||
| CVE-2020-11668 | ||
| CVE-2019-20934 | ||
| libldap-2_4-2=2.4.41-18.83.1 openldap2|2.4.41-18.83.1 openldap2-client=2.4.41-18.83.1 |
CVE-2020-36230 | |
| CVE-2020-36229 | ||
| CVE-2020-36228 | ||
| CVE-2020-36227 | ||
| CVE-2020-36225 | ||
| CVE-2020-36224 | ||
| CVE-2020-36226 | ||
| CVE-2020-36222 | ||
| CVE-2020-36221 | ||
| CVE-2020-36223 | ||
| CVE-2021-27212 | ||
| CVE-2020-25709 | ||
| libopenssl1_0_0=1.0.2j-60.63.1 libowb1_0_0=1.5.0.0-1 openssl|1.0.2j-60.63.1 |
CVE-2020-1971 | |
| libpython2_7-1_0=2.7.18-28.67.1 python-base=2.7.18-28.67.1 python-xml=2.7.18-28.67.1 |
CVE-2021-23336 | |
| libpython3_4m1_0=3.4.10-25.63.2 python3=3.4.10-25.63.1 python3-base=3.4.10-25.63.2 |
CVE-2021-3177 | |
| libstdc++610.2.1+git583-1.3.5 | CVE-2020-13844 | |
| perl-XML-Twig=3.44-5.3.1 | CVE-2016-9180 |
SP5-based systems
| Third-party Component | CVEs | More Information |
| bind-utils=9.11.22-3.29.1 | CVE-2020-8625 | See NVD (http://nvd.nist.gov/) for individual scores for each CVE. |
| curl=7.60.0-11.12.1 | CVE-2019-5481 | |
| file=5.22-10.18.1 file-magic=5.22-10.18.1 |
CVE-2012-1571 | |
| glib2-lang=2.48.2-12.22.1 libglib-2_0-0=2.48.2-12.22.1 libgmodule-2_0-0=2.48.2-12.22.1 libgobject-2_0-0=2.48.2-12.22.1 |
CVE-2021-27218 | |
| CVE-2021-27219 | ||
| glibc=2.22-114.8.3 glibc-i18ndata=2.22-114.8.3 glibc-locale=2.22-114.8.3 |
CVE-2020-27618 | |
| CVE-2020-29562 | ||
| CVE-2020-29573 | ||
| CVE-2019-25013 | ||
| CVE-2021-3326 | ||
| grub2=2.02-12.47.1 grub2-i386-pc=2.02-12.47.1 grub2-snapper-plugin=2.02-12.47.1 grub2-systemd-sleep-plugin=2.02-12.47.1 |
CVE-2021-20225 | |
| CVE-2020-14372 | ||
| CVE-2020-27749 | ||
| CVE-2021-20233 | ||
| CVE-2020-25647 | ||
| CVE-2020-25632 | ||
| CVE-2020-27779 | ||
| kbd-legacy=2.0.4-8.10.2 | CVE-2011-0460 | |
| kernel-default=4.12.14-122.66.2 | CVE-2020-27673 | |
| CVE-2021-29154 | ||
| CVE-2020-25673 | ||
| CVE-2020-25672 | ||
| CVE-2020-27671 | ||
| CVE-2020-27670 | ||
| CVE-2020-36311 | ||
| CVE-2021-30002 | ||
| CVE-2021-3483 | ||
| CVE-2021-20219 | ||
| CVE-2021-28964 | ||
| CVE-2021-3444 | ||
| CVE-2021-28971 | ||
| CVE-2021-28688 | ||
| CVE-2021-29265 | ||
| CVE-2021-29264 | ||
| CVE-2021-28972 | ||
| CVE-2021-29647 | ||
| CVE-2020-27171 | ||
| CVE-2020-27170 | ||
| CVE-2021-28660 | ||
| CVE-2020-35519 | ||
| CVE-2021-3428 | ||
| CVE-2020-0433 | ||
| CVE-2021-28038 | ||
| CVE-2020-27815 | ||
| CVE-2021-27365 | ||
| CVE-2021-27363 | ||
| CVE-2020-29368 | ||
| CVE-2021-26930 | ||
| CVE-2021-26932 | ||
| CVE-2020-27786 | ||
| CVE-2021-3348 | ||
| CVE-2021-3347 | ||
| CVE-2020-25211 | ||
| CVE-2020-27675 | ||
| CVE-2021-20177 | ||
| CVE-2021-0342 | ||
| CVE-2020-27835 | ||
| CVE-2020-29568 | ||
| CVE-2020-29569 | ||
| CVE-2020-25639 | ||
| libbind9-161=9.11.22-3.29.1 libdns1110=9.11.22-3.29.1 libirs161=9.11.22-3.29.1 libisc1107=9.11.22-3.29.1 libisccc161=9.11.22-3.29.1 libisccfg163=9.11.22-3.29.1 liblwres161=9.11.22-3.29.1 python-bind=9.11.22-3.29.1 |
CVE-2020-8625 | |
| CVE-2017-3145 | ||
| CVE-2018-5740 | ||
| CVE-2018-5745 | ||
| CVE-2019-6465 | ||
| CVE-2018-5743 | ||
| CVE-2019-6471 | ||
| CVE-2020-8616 | ||
| CVE-2020-8617 | ||
| CVE-2020-8624 | ||
| CVE-2020-8623 | ||
| CVE-2020-8622 | ||
| CVE-2016-2775 | ||
| CVE-2016-2776 | ||
| CVE-2016-6170 | ||
| CVE-2016-8864 | ||
| CVE-2016-9131 | ||
| CVE-2016-9147 | ||
| CVE-2016-9444 | ||
| CVE-2017-3135 | ||
| CVE-2017-3136 | ||
| CVE-2017-3137 | ||
| CVE-2017-3138 | ||
| CVE-2017-3142 | ||
| CVE-2016-1285 | ||
| CVE-2016-1286 | ||
| CVE-2015-8704 | ||
| CVE-2015-8000 | ||
| CVE-2015-5722 | ||
| CVE-2015-5477 | ||
| CVE-2015-1349 | ||
| CVE-2015-4620 | ||
| CVE-2014-8500 | ||
| CVE-2014-0591 | ||
| CVE-2013-4854 | ||
| CVE-2013-2266 | ||
| CVE-2012-5689 | ||
| CVE-2012-5688 | ||
| CVE-2012-5166 | ||
| CVE-2012-4244 | ||
| CVE-2012-3817 | ||
| CVE-2012-1667 | ||
| CVE-2012-3868 | ||
| CVE-2011-4313 | ||
| CVE-2011-1910 | ||
| CVE-2011-1907 | ||
| CVE-2011-2464 | ||
| CVE-2011-0414 | ||
| CVE-2010-3614 | ||
| CVE-2010-3615 | ||
| CVE-2010-3613 | ||
| CVE-2009-4022 | ||
| CVE-2009-0696 | ||
| libcurl4=7.60.0-11.12.1 | CVE-2019-5481 | |
| libebl1=0.158-7.13.3 | CVE-2018-16403 | |
| CVE-2016-10254 | ||
| CVE-2016-10255 | ||
| CVE-2018-18521 | ||
| CVE-2017-7611 | ||
| CVE-2017-7610 | ||
| CVE-2018-16062 | ||
| CVE-2018-18310 | ||
| CVE-2019-7150 | ||
| CVE-2019-7665 | ||
| CVE-2017-7607 | ||
| CVE-2018-18520 | ||
| CVE-2017-7608 | ||
| CVE-2017-7613 | ||
| CVE-2017-7612 | ||
| CVE-2014-9447 | ||
| CVE-2014-0172 | ||
| libldap-2_4-2=2.4.41-18.83.1 openldap2|2.4.41-18.83.1 |
CVE-2020-36230 | |
| CVE-2020-36229 | ||
| CVE-2020-36228 | ||
| CVE-2020-36227 | ||
| CVE-2020-36225 | ||
| CVE-2020-36224 | ||
| CVE-2020-36226 | ||
| CVE-2020-36222 | ||
| CVE-2020-36221 | ||
| CVE-2020-36223 | ||
| CVE-2021-27212 | ||
| libmagic1=5.22-10.18.1 | CVE-2012-1571 | |
| libnghttp2-14=1.39.2-3.5.1 | CVE-2020-11080 | |
| CVE-2019-9511 | ||
| CVE-2018-1000168 | ||
| CVE-2016-1544 | ||
| libopenssl1_0_0=1.0.2p-3.33.1 libowb1_0_0=1.5.0.0-1 |
CVE-2020-1971 | |
| libpython2_7-1_0=2.7.18-28.67.1 python-base=2.7.18-28.67.1 python-xml=2.7.18-28.67.1 |
CVE-2021-23336 | |
| libpython3_4m1_0=3.4.10-25.66.1 libpython3_6m1_0=3.6.13-4.36.1 python3=3.4.10-25.66.1 python3-base=3.4.10-25.66.1 python36=3.6.13-4.36.1 python36-base=3.6.13-4.36.1 |
CVE-2021-23336 | |
| CVE-2021-3177 | ||
| libssh4=0.8.7-3.9.1 | CVE-2020-1730 | |
| CVE-2019-14889 | ||
| CVE-2014-8132 | ||
| CVE-2015-3146 | ||
| CVE-2016-0739 | ||
| CVE-2018-10933 | ||
| CVE-2014-0017 | ||
| CVE-2013-0176 | ||
| CVE-2012-4559 | ||
| CVE-2012-4560 | ||
| CVE-2012-4561 | ||
| libstdc++6=10.2.1+git583-1.3.5 | CVE-2020-13844 | |
| openssl-1_0_0=1.0.2p-3.33.1 | CVE-2020-1971 | |
| CVE-2019-1551 | ||
| CVE-2019-1547 | ||
| CVE-2019-1563 | ||
| CVE-2019-1559 | ||
| CVE-2018-5407 | ||
| CVE-2018-0734 | ||
| CVE-2018-0737 | ||
| CVE-2018-0732 | ||
| CVE-2016-0800 | ||
| CVE-2016-7055 | ||
| CVE-2017-3731 | ||
| CVE-2017-3732 | ||
| CVE-2017-3735 | ||
| CVE-2017-3736 | ||
| CVE-2017-3737 | ||
| CVE-2017-3738 | ||
| CVE-2017-3739 | ||
| CVE-2016-7052 | ||
| CVE-2016-6304 | ||
| CVE-2016-2177 | ||
| CVE-2016-2178 | ||
| CVE-2016-2179 | ||
| CVE-2016-2180 | ||
| CVE-2016-2181 | ||
| CVE-2016-2182 | ||
| CVE-2016-2183 | ||
| CVE-2016-6302 | ||
| CVE-2016-6303 | ||
| CVE-2016-6306 | ||
| CVE-2016-2107 | ||
| CVE-2016-2105 | ||
| CVE-2016-2106 | ||
| CVE-2016-2109 | ||
| CVE-2016-2176 | ||
| CVE-2016-0702 | ||
| CVE-2016-0705 | ||
| CVE-2016-0797 | ||
| CVE-2016-0798 | ||
| CVE-2016-0799 | ||
| CVE-2015-3197 | ||
| CVE-2015-3194 | ||
| CVE-2015-3195 | ||
| CVE-2015-3196 | ||
| CVE-2015-0287 | ||
| CVE-2015-4000 | ||
| CVE-2015-1788 | ||
| CVE-2015-1789 | ||
| CVE-2015-1790 | ||
| CVE-2015-1792 | ||
| CVE-2015-1791 | ||
| CVE-2015-3216 | ||
| CVE-2015-0209 | ||
| CVE-2015-0286 | ||
| CVE-2015-0288 | ||
| CVE-2015-0289 | ||
| CVE-2015-0293 | ||
| CVE-2014-3570 | ||
| CVE-2014-3571 | ||
| CVE-2014-3572 | ||
| CVE-2014-8275 | ||
| CVE-2015-0204 | ||
| CVE-2015-0205 | ||
| CVE-2015-0206 | ||
| CVE-2014-3513 | ||
| CVE-2014-3567 | ||
| CVE-2014-3568 | ||
| CVE-2014-3566 | ||
| CVE-2014-3512 | ||
| CVE-2014-3511 | ||
| CVE-2014-3510 | ||
| CVE-2014-3507 | ||
| CVE-2014-3506 | ||
| CVE-2014-3505 | ||
| CVE-2014-3509 | ||
| CVE-2014-5139 | ||
| CVE-2014-3508 | ||
| CVE-2014-0224 | ||
| CVE-2014-0221 | ||
| CVE-2014-0195 | ||
| CVE-2014-3470 | ||
| CVE-2014-0198 | ||
| CVE-2010-5298 | ||
| CVE-2014-0160 | ||
| CVE-2014-0076 | ||
| CVE-2013-4353 | ||
| CVE-2013-6449 | ||
| CVE-2013-6450 | ||
| CVE-2012-4929 | ||
| CVE-2013-0166 | ||
| CVE-2012-2686 | ||
| CVE-2012-2110 | ||
| CVE-2012-1165 | ||
| CVE-2012-0884 | ||
| CVE-2012-0050 | ||
| CVE-2011-4576 | ||
| CVE-2011-4577 | ||
| CVE-2011-4619 | ||
| CVE-2012-0027 | ||
| CVE-2011-3207 | ||
| CVE-2011-0014 | ||
| CVE-2010-1633 | ||
| CVE-2010-2939 | ||
| CVE-2010-3864 | ||
| CVE-2010-0742 | ||
| CVE-2010-0740 | ||
| CVE-2008-5077 | ||
| CVE-2009-0590 | ||
| CVE-2009-0591 | ||
| CVE-2009-0789 | ||
| CVE-2009-1377 | ||
| CVE-2009-1378 | ||
| CVE-2009-1379 | ||
| CVE-2009-1386 | ||
| CVE-2009-1387 | ||
| rsyslog=8.24.0-3.46.1 | CVE-2013-6370 | |
| CVE-2013-6371 | ||
| CVE-2013-4758 | ||
| CVE-2011-3200 | ||
| tar=1.27.1-15.9.1 tar-lang=1.27.1-15.9.1 |
CVE-2021-20193 |
Dell creates and distributes the Data Protection Central (DPC) OS Update. These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.
For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To search for a particular CVE, use the database’s search utility at http://web.nvd.nist.gov/view/vuln/search.
Resolution:
Apply the Data Protection Central OS Update to all Data Protection Central systems installed via DPC OVA deployment; DPC systems installed without use of the DPC OVA are not updated by the DPC OS Update procedure.
To upgrade your Dell Data Protection Central system, see KB article 34881: Data Protection Central: How to Install the Data Protection Central OS Update for installation instructions.
Dell recommends all customers upgrade at the earliest opportunity.
For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To search for a particular CVE, use the database’s search utility at http://web.nvd.nist.gov/view/vuln/search.
Resolution:
Apply the Data Protection Central OS Update to all Data Protection Central systems installed via DPC OVA deployment; DPC systems installed without use of the DPC OVA are not updated by the DPC OS Update procedure.
To upgrade your Dell Data Protection Central system, see KB article 34881: Data Protection Central: How to Install the Data Protection Central OS Update for installation instructions.
Dell recommends all customers upgrade at the earliest opportunity.
Dell creates and distributes the Data Protection Central (DPC) OS Update. These DPC OS Updates contain security patches from third party components for the Data Protection Central system. See Data Protection Central OS Update Release Notes for more information.
For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To search for a particular CVE, use the database’s search utility at http://web.nvd.nist.gov/view/vuln/search.
Resolution:
Apply the Data Protection Central OS Update to all Data Protection Central systems installed via DPC OVA deployment; DPC systems installed without use of the DPC OVA are not updated by the DPC OS Update procedure.
To upgrade your Dell Data Protection Central system, see KB article 34881: Data Protection Central: How to Install the Data Protection Central OS Update for installation instructions.
Dell recommends all customers upgrade at the earliest opportunity.
For more information about any of the Common Vulnerabilities and Exposures (CVEs) mentioned here, consult the National Vulnerability Database (NVD) at http://nvd.nist.gov/home.cfm. To search for a particular CVE, use the database’s search utility at http://web.nvd.nist.gov/view/vuln/search.
Resolution:
Apply the Data Protection Central OS Update to all Data Protection Central systems installed via DPC OVA deployment; DPC systems installed without use of the DPC OVA are not updated by the DPC OS Update procedure.
To upgrade your Dell Data Protection Central system, see KB article 34881: Data Protection Central: How to Install the Data Protection Central OS Update for installation instructions.
Dell recommends all customers upgrade at the earliest opportunity.
Corrección y productos afectados
| Product | Affected Version) | Updated Versions | Link to Update | |
| Dell Data Protection Central | 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, 19.3, 19.4 | 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, 19.3, 19.4 | DPC Software DPC Release Notes |
|
| Dell IDPA System Manager | 18.1, 18.2, 19.2 | 18.1, 18.2, 19.2 | DPC Software DPC Release Notes |
| Product | Affected Version) | Updated Versions | Link to Update | |
| Dell Data Protection Central | 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, 19.3, 19.4 | 1.0.0, 1.0.1, 18.1, 18.2, 19.1, 19.2, 19.3, 19.4 | DPC Software DPC Release Notes |
|
| Dell IDPA System Manager | 18.1, 18.2, 19.2 | 18.1, 18.2, 19.2 | DPC Software DPC Release Notes |
Historial de revisiones
| Revision | Date | Description |
| 1.1.2-1 | 2021-04-22 | Minor |
| 1.1.1-4 | 2021-01-29 | Minor |
Información relacionada
Descargo de responsabilidad
Productos afectados
Data Protection Central, Product Security InformationProductos
Data Protection Central, Data Protection Central, PowerProtect Data Protection Software, Integrated Data Protection Appliance Family, PowerProtect Data Protection Hardware, Integrated Data Protection Appliance SoftwarePropiedades del artículo
Número del artículo: 000185736
Tipo de artículo: Dell Security Advisory
Última modificación: 01 ago 2022
Encuentre respuestas a sus preguntas de otros usuarios de Dell
Servicios de soporte
Compruebe si el dispositivo está cubierto por los servicios de soporte.